731 research outputs found

    Chinese Muslims in Taipei, Nanjing, and Shanghai

    Get PDF

    Tactical Analysis of Attack in Physical and Digital Security Incidents:Towards a Model of Asymmetry

    Get PDF
    Asymmetric warfare is frequently described as a conflict where ‘weaker’ parties aim to offset their relatively inadequate resources by using particular strategies and tactics to their advantage. This research-in-progress paper develops a concept model of asymmetric warfare that represents the leverage available to the ‘weaker’ party over the ‘stronger’ party simply because the former is attacking rather than defending. Points of leverage include choice of timing, location, method of attack, best use of limited resources and time to prepare. The resulting concept model is used to discuss generic defensive strategies that can be applied by ‘stronger’ parties in the physical and digital environments. For example, defenders can make their assets difficult to access except under limited circumstances such as a carefully designed defensive system. In this way attackers are forced to engage targets under conditions that maximize the defenders own advantages

    The content and delivery of psychological interventions for perinatal depression by non-specialist health workers in low and middle income countries: a systematic review.

    Get PDF
    Psychological interventions delivered by non-specialist health workers are effective for the treatment of perinatal depression in low- and middle-income countries. In this systematic review, we describe the content and delivery of such interventions. Nine studies were identified. The interventions shared a number of key features, such as delivery provided within the context of routine maternal and child health care beginning in the antenatal period and extending postnatally; focus of the intervention beyond the mother to include the child and involving other family members; and attention to social problems and a focus on empowerment of women. All the interventions were adapted for contextual and cultural relevance; for example, in domains of language, metaphors and content. Although the competence and quality of non-specialist health workers delivered interventions was expected to be achieved through structured training and ongoing supervision, empirical evaluations of these were scarce. Scalability of these interventions also remains a challenge and needs further attention

    Universiti Teknologi PETRONAS (UTP) Food and Beverage Requisition System (General Administration)

    Get PDF
    The Dissertation contains all the documentation and information that has been performed by the student. The focus of this study is mainly to improve the current Universiti Teknologi PETRONAS (UTP) Food and Beverage Requisition System, from manual paper-based system into online requisition system. The purpose of improvement from the old system into a new system is to eliminate all the problems that have arose and also to increase the efficiency and the effectiveness of the system. There are several problems that this project try to address such as too much requests at one time, last minute request, too much time taken to process all the requests and other problems involved. Online requisition system has been used widely by many organizations. The unique features which are available in the new system compared to the traditional system make it attractive for the organizations to implement the system. The features that make it unique are like removing the usage of paper, electronic approval status, quick online entry and other features. There are two methods that will be used to perform the data collection which are qualitative analysis and the other one is quantitative analysis. Qualitative analysis involves interview and research on the journals that have been done previously. While quantitative analysis is mainly focusing on the quantity of the data that is able to be collected through questionnaires and also surveys. For the development tools, PHP, HTML and other programming language will be used to develop the system and Adobe Photoshop CS4 Portable will be used to design the system. The result of the first part of this project shows several information important features those are needed for this system for example is the availability of transaction summary, notice related with the rules of requisition, online approval and other features. The development of this project has been done and minimum viable project has been achieved. System‟s interface and the coding part will be elaborate in details in this report

    Determining Factors of Private Investment: Empirical Study of Pakistan

    Get PDF
    There is an ample amount of work on private investment for the cases of both developed and developing economies. Blejer and Khan (1984) study the investment function for developing countries using pooled data of 24 countries for the period 1971-1979. They find credit availability and infrastructural public investments are positively related to private investment. They observe that crowding-out phenomena works in case of non-infrastructural investment. As quoted by Saker (1993), behavior of private investment is quite different in developed and developing economies. Credit availability and government investment appear to be strong boosters of private investment in case of developing economies. Utilizing the Pakistani data set from FY 1974 to FY 1992, Saker (1993) concludes that private investment is positively correlated with output growth, private sector credit availability and government infrastructural investment. Oshikoya (1994) models private investment function for various middle-income and low-income African countries for the period 1971-1988. He finds that real output growth, real exchange rate, credit availability and government infrastructural investment are positively related to domestic private investment in studied African countries. Inflation and external debt servicing add to macroeconomic uncertainty and are, therefore negatively related to private investment

    Primary testicular lymphoma in undescended testis of a middle-age man: a case report

    Get PDF
    Background: Primary testicular lymphoma (PTL) is an uncommon and aggressive form of extra-nodal non-Hodgkin lymphoma (NHL), accounting for <5.0% of testicular malignancies and 1.0% to 2.0% of NHL cases with a median age at diagnosis of 66 to 68 years. PTL accounts for 1–9% of testicular malignancies and 1–2% of NHLs. There are a handful of described lymphomas in the literature affecting normally positioned testis of aged men, yet none were reported in a cryptorchid middle-aged man. PTL is an extremely aggressive malignancy with poor progression-free survival and overall survival. Case presentation: A 47-year-old man presented to the urology clinic complaining of multiple painless swellings in the neck and groins. He also complains of back pain, drenching night sweats, a swollen right lower limb, constipation, anorexia, weight loss, and occasional vomiting. The illness's duration is 2 months. He had a right inguinal testis. Histology examination of the excised testis and lymph nodes revealed an advanced “diffuse large beta-cell lymphoma” in both. The patient was referred for oncology care. Conclusion: It is an extremely rare case of Diffuse Large B-Cell Lymphoma (DLBCL) in the undescended testis of a middle-aged man. To the best of our knowledge, this is the first published case of its kind about the tumor's type, testis anomaly, and patient's age

    Adaptive Channel Coding and Modulation Scheme Selection for Achieving High Throughput in Wireless Networks

    Get PDF
    Modern wireless communication demands reliable data communication at high throughput in severe channel conditions like narrowband interference, frequency selective fading due to multipath and attenuation of high frequencies. Traditional single carrier systems address this set of problems by the use of complex, computationally intensive equalization filters. The Orthogonal Frequency Division Multiplexing (OFDM) based system, as opposed to single-carrier systems, is considered to be the future of the wireless communication and is being used to achieve high data rate by overcoming severe channel conditions without the use of these complex filters.This paper discusses the problem of Adaptive Modulation scheme selection through an OFDM based system over parallel frequency selective fading channels. An adaptive coding scheme is proposed by using Generalized Concatenated Codes (GCC), which have simple structure and are designed in such a way that they are best suited for fading channels. GCC are based on binary cyclic codes. The criterion of the proposed research is to optimize the throughput of a wireless system. Depending on the quality of sub-channels an adaptive modulation selection scheme and code assigning method is proposed. The proposed research combats against channel impairments better than those used in conventional systems by exploiting individual sub-channel condition. Results show better performance in terms of higher throughput by minimizing the bit error rate

    Information Security Risk Assessment: Towards a Business Practice Perspective

    Get PDF
    Information security risk assessments (ISRAs) are of great importance for organisations. Current ISRA methods identify an organisation’s security risks and provide a measured, analysed security risk profile of critical information assets in order to build plans to treat risk. However, despite prevalent use in organisations today, current methods adopt a limited view of information assets during risk identification. In the context of day-to-day activities, people copy, print and discuss information, leading to the ‘leakage’ of information assets. Employees will create and use unofficial assets as part of their day-to-day routines. Furthermore, employees will also possess important knowledge on how to perform their functions within a business process or information system. These are all elements of business ‘practice’, a perspective that would yield a richer and holistic understanding of an organisation’s information assets and vulnerabilities. This perspective is not captured by traditional ISRA methods, leading to an incomplete view of an organisation’s information systems and processes that could prove detrimental and damaging. This paper hence suggests that a business practice perspective be incorporated into ISRA methods in order to identify information leakage, unofficial, critical information assets and critical process knowledge of organisations

    The Impact of Social Media on Fashion Industry: Empirical Investigation from Karachiites

    Get PDF
    This study is an attempt to investigate the impact of social media on fashion industry as social media is getting very much in and within the past decade a remarkable development has been witnessed. Businesses are using social media as a promotional tool. Fashion industry is one of the businesses where frequent changes occur and social media is the most convenient and cheapest mean to communicate. Based on convenience sampling, five organizations were selected and a sample of 130 respondents was obtained which had two variables i.e. Social media and Fashion industry which further defused into four sub variables each.Reliability of the questionnaire fell within the acceptable band. As a preliminary investigation, correlation between the variables is obtained which is 45.4% and significant at 1% confidence level. Further, the results obtained through regression shows that social media is a significant predictor of fashion industry. Keywords: Social media, Fashion industry, Face book
    corecore